This paper explores the potential of machine-mastering models to automate network Anomaly Detection (NAD) through Time series analysis. We employ a two-level method wherein the primary degree entails function selectio...
详细信息
We present the principled design of a control pipeline for the synthesis of policies from examples data. The pipeline, based on a discretized design, expounds the algorithm introduced in [1] to synthesize policies fro...
We present the principled design of a control pipeline for the synthesis of policies from examples data. The pipeline, based on a discretized design, expounds the algorithm introduced in [1] to synthesize policies from examples for constrained, stochastic and nonlinear systems. The pipeline: (i) does not need the constraints to be fulfilled in the possibly noisy example data; (ii) enables control synthesis even when the data are collected from an example system that is different from the one under control. The design is benchmarked on an example that involves controlling an inverted pendulum with actuation constraints. The data that are used to synthesize the policy are collected from a pendulum that: (i) is different from the one under control; (ii) does not satisfy the actuation constraints.
In this paper, we construct new t-server Private Information Retrieval (PIR) schemes with communication complexity subpolynomial in the previously best known, for all but finitely many t. Our results are based on comb...
详细信息
Young’s modulus of New Red Sandstone was investigated experimentally to gain insight into its nonlinear nature.A large experimental programme was carried out by applying a controllable quasi-static and dynamic uniaxi...
详细信息
Young’s modulus of New Red Sandstone was investigated experimentally to gain insight into its nonlinear nature.A large experimental programme was carried out by applying a controllable quasi-static and dynamic uniaxial loading to 286 dry sandstone samples of four different *** static and dynamic tests,similar to those aiming at determining the uniaxial compressive strength,were conducted using the state-of-the-art experimental facilities at the University of Aberdeen including a custom-built small experimental rig for inducing a dynamic uniaxial compressive load via a piezoelectric *** obtained results have confirmed a complex nature of Young’s modulus of ***,under a harmonic dynamic loading,it shows strongly nonlinear behaviour,which is hardening and softening with respect to frequency and amplitude of the dynamic loading,respectively.
Recently, Deep Learning (DL) methods are a well-known solution for image and object detection in computer vision applications. The software-based implementation of DL algorithms requires huge resources and consumes mo...
详细信息
The earth’s ecosystems are negatively impacted by the development of agriculture in both terrestrial and marine environments. Cropland losses, water scarcity, species infestations, land degradation, and climate chang...
详细信息
Underwater target localization has always been a challenging and important research topic in underwater acoustic sensing, especially when the underwater target is moving. This paper uses three pulse signals for system...
详细信息
The Advanced Encryption Standard cryptographic algorithm,named AES,is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information *** of the ...
详细信息
The Advanced Encryption Standard cryptographic algorithm,named AES,is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information *** of the most effective physical attacks against the hardware implementation of AES is fault attacks which can extract secret *** now,a several AES fault detection schemes against fault injection attacks have been *** this paper,so as to ensure a high level of security against fault injection attacks,a new efficient fault detection scheme based on the AES architecture modification has been *** this reason,the AES 32-bit round is divided into two half rounds and input and pipeline registers are implemented between *** proposed scheme is independent of the procedure the AES is ***,it can be implemented to secure the pipeline and iterative *** evaluate the robustness of the proposed fault detection scheme against fault injection attacks,we conduct a transient and permanent fault attacks and then we determine the fault detection capability;it is about 99.88585%and 99.9069%for transient and permanent faults *** have modeled the AES fault detection scheme using VHDL hardware language and through hardware FPGA *** FPGA results demonstrate that our scheme can efficiently protect the AES hardware implementation against fault *** can be simply implemented with low *** addition,the FPGA implementation performances prove the low area overhead and the high efficiency and working frequency for the proposed AES detection scheme.
暂无评论